近五年来发表的学术论文
Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue. DP-Promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis. USENIX Security 2024. (To Appear)
Mingyao Shao, Yuejun Liu, Yongbin Zhou. Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. ACM AsiaCCS 2024(To Appear)
Xinkuan Qiu, Meina Kan, Yongbin Zhou, Yanchao Bi, Shiguang Shan. Shape-Biased CNNs Are Not Always Superior in Out-of-Distribution Robustness. IEEE/CVF WACV 2024, pp. 2326-2335, 2024.
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Jingdian Ming, Chengbin Jin, Huizhong Li. Practical Public Template Attacks on CRYSTALS-DILITHIUM With Randomness Leakages. IEEE Transactions on Information Forensics and Security, 18:1-14 (2023).
Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li. Table Re-Computation Based Low Entropy Inner Product Masking Scheme. DATE 2023, pp.1-6, 2023.
Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao. Revealing the Weakness of Addition Chain Based Masked SBox Implementations. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2021, Issue 4, pp.326-350.
Yuejun Liu, Yongbin Zhou*, Rui Zhang, Yang Tao. (Full) Leakage Resilience of Fiat-Shamir Signatures over Lattices. Frontiers of Computer Science, (To Appear).
Yiwen Gao, Yongbin Zhou*. Side-channel Attacks with Multi-thread Mixed Leakage. IEEE Transactions on Information Forensics and Security,16:770-785 (2021)
Huizhong Li, Yongbin Zhou*, Jingdian Ming, Guang Yang,Chengbin Jin. The Notion of Transparency Order, Revisited. The Computer Journal,63(12):1915–1938 (2020)
Ti Wang, Hui Ma, Yongbin Zhou, Rui Zhang, Zishuai Song. Fully Accountable Data Sharing for Pay-As-You-Go Cloud Scenes.IEEE Transactions on Dependable and Secure Computing, 18(4):2005-2016 (2021)
Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang, Qian Zhang. Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE Transactions on Information Forensics and Security, 15:3694-3708 (2020)
Yiwen Gao, Yongbin Zhou*, Wei Cheng. Efficient Electro-Magnetic Analysis of a GPU Bitsliced AES Implementation. Cybersecurity, 3(1): 3 (2020)
Yuejun Liu, Rui Zhang, Yongbin Zhou*. Predicate Encryption against Master-Key Tampering Attacks. Cybersecurity, 2(1): 22 (2019)
Hailong Zhang, Yongbin Zhou. Template Attack vs. Stochastic Model: An Empirical Study on the Performances of Profiling Attacks in Real Scenarios. Microprocessors and Microsystems,66: 43-54 (2019)
Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou*. CDAE: Towards Empowering Denoising in Side-Channel Analysis. ICICS 2019: 269-286
Hailong Zhang, Yongbin Zhou. On the Exact Relationship between the Mutual Information Metric and the Success Rate Metric. Information Sciences, 435: 15-25 (2018)
Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou*. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. CARDIS 2018: 1-17
Hailong Zhang, Yongbin Zhou. Multiple Leakage Samples based Higher Order Optimal Distinguisher. Information Sciences, 466: 92-108 (2018)
Yiwen Gao, Wei Cheng, Hailong Zhang, Yongbin Zhou*. Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. IEEE TrustCom 2018: 300-306
Yiwen Gao, Hailong Zhang, Wei Cheng, Yongbin Zhou*, Yuchen Cao. Electro-Magnetic Analysis of GPU-based AES Implementation. ACM DAC 2018: 121:1-121:6
Qian Zhang, Yongbin Zhou*, Shuang Qiu, Wei Cheng, Jingdian Ming, Rui Zhang.A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. IEEE ICCD 2018: 545-552
Hailong Zhang, Yongbin Zhou.Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. The Computer Journal, 60(8): 1131-1144 (2017)
Wei Yang, Yongbin Zhou, Yuchen Cao, Hailong Zhang, Qian Zhang, Huan Wang. Multi-Channel Fusion Attacks. IEEE Transactions on Information Forensics and Security,12(8): 1757-1771 (2017)
Rui Zhang, Shuang Qiu, Yongbin Zhou. Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE Transactions on Information Forensics and Security,12(11): 2590-2598 (2017)
Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang. Reducing Randomness Complexity of Mask Refreshing Algorithm. ICICS 2017: 88-101
Hailong Zhang, Yongbin Zhou. How Many Interesting Points Should be Used in a Template Attack? Journal of Systems and Software, 120: 105-113 (2016)
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng. Towards Optimal Leakage Exploitation Rate in Template Attacks. Security and Communication Networks, 9(16): 3116-3126 (2016)
Hailong Zhang, Yongbin Zhou, Dengguo Feng. Theoretical and Practical Aspects of Multiple Samples Correlation Power Analysis. Security and Communication Networks, 9(18): 5166-5177 (2016)
Wei Yang, Yuchen Cao, Yongbin Zhou*, Hailong Zhang, Qian Zhang. Distance Based Leakage Alignment for Side Channel Attacks. IEEE Signal Processing Letters. 23(4): 419-423 (2016)
Yuchen Cao, Yongbin Zhou*, Hailong Zhang, Wei Yang. Hilbert Transform Based Vertical Preprocessing for Side-Channel Analysis. IEEE ICCCN 2016: 1-7
Wei Cheng, Yongbin Zhou*, Laurent Sauvage. Differential Fault Analysis on Midori. ICICS 2016: 307-317
Rupeng Yang, Qiuliang Xu, Yongbin Zhou*, Rui Zhang, Chengyu Hu, Zuoxia Yu. Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285